咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是541-550 订阅
排序:
Audio-visual multimodal speech recognition method fusing audio and video data  2
Audio-visual multimodal speech recognition method fusing aud...
收藏 引用
2nd International Conference on Digital Signal and computer Communications, DSCC 2022
作者: Zhao, Jian Zhang, Zhiwei Cui, Yuqing Qiang, Wenqian Dai, Weiqiang Kuang, Zhejun Shi, Lijuan Changchun University Department of Computer Science and Technology Changchun130022 China Jilin Provincial Key Laboratory of Human Health Status Identification and Function Enhancement Changchun130022 China Changchun University Department of Electronic Information Engineering Changchun130022 China Changchun University Cyberspace Security System Changchun130022 China
With the widespread application of deep learning methods, multimodal techniques have also achieved rapid development. Since single-modal speech recognition may affect the accuracy of recognition results in noisy envir... 详细信息
来源: 评论
Riemannian Complex Hermit Positive Definite Convolution Network for Polarimetric SAR Image Classification
arXiv
收藏 引用
arXiv 2025年
作者: Shi, Junfei Nie, Mengmeng Li, Yuke Jin, Haiyan Lin, Weisi Department of Computer Science and Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an China College of Computing and Data Science Nanyang Technological University 639798 Singapore
Deep learning can learn high-level semantic features in Euclidean space effectively for PolSAR images, while they need to covert the complex covariance matrix into a feature vector or complex-valued vector as the netw... 详细信息
来源: 评论
Electrically tunable planar liquid-crystal singlets for simultaneous spectrometry and imaging
收藏 引用
Light(science & Applications) 2024年 第11期13卷 2589-2598页
作者: Zhou Zhou Yiheng Zhang Yingxin Xie Tian Huang Zile Li Peng Chen Yan-qing Lu Shaohua Yu Shuang Zhang Guoxing Zheng Electronic Information School and School of MicroelectronicsWuhan UniversityWuhan 430072China NUS Graduate School National University of SingaporeSingapore 119077Singapore Department of Electrical and Computer Engineering National University of SingaporeSingapore 117583Singapore National Laboratory of Solid State Microstructures Key Laboratory of Intelligent Optical Sensing and Manipulationand College of Engineering and Applied SciencesNanjing UniversityNanjing 210093China Peng Cheng Laboratory Shenzhen 518055China New Cornerstone Science Laboratory Department of PhysicsUniversity of Hong KongHong KongChina Department of Electrical and Electronic Engineering University of Hong KongHong KongChina Wuhan Institute of Quantum Technology Wuhan 430206China
Conventional hyperspectral cameras cascade lenses and spectrometers to acquire the spectral datacube,which forms the fundamental framework for hyperspectral ***,this cascading framework involves tradeoffs among spectr... 详细信息
来源: 评论
Specifications of Virtual Reminder system using Z
Specifications of Virtual Reminder System using Z
收藏 引用
International Conference on Emerging Technologies, ICET
作者: J aviria Naveed Irfan Ahmed Jabar Mahmood Khadija Batool Department of Computer Sciences University of Sialkot Sialkot Pakistan State Key Laboratory of Blockchain and Data Security School of Cyber Science and Technology College of Computer Science and Technology Zhejiang University Hangzhou China
Formal Methods (FM) uses mathematical notations to precisely and accurately define specifications, which helps detect errors and inconsistencies in software development. For mathematical notations, a proper mathematic... 详细信息
来源: 评论
AI-aided power electronic converters automatic online real-time efficiency optimization method
收藏 引用
Fundamental Research 2025年 第3期5卷 1111-1116页
作者: Tang, Yuanhong Cao, Di Xiao, Jian Jiang, Chenying Huang, Qi Li, Yunwei Chen, Zhe Blaabjerg, Frede Hu, Weihao Power System Wide-area Measurement and Control Sichuan Provincial Key Laboratory School of Mechanical and Electrical Engineering University of Electronic Science and Technology of China Chengdu 611731 China MORNSUN Guangzhou Science & Technology Co. Ltd. Guangzhou 510663 China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu 611731 China Yangtze Delta Region Institute (Quzhou) University of Electronic Science and Technology of China Quzhou 324000 China Department of Chengdu State Grid Corporation of China Chengdu 610599 China Southwest University of Science and Technology Mianyang 621010 China Department of Electrical and Computer Engineering University of Alberta Edmonton AB T6G 2V4 Canada Department of Energy Technology Aalborg University Aalborg 9220 Denmark
Energy losses during the conversion and supply of electric power are considered a significant issue and cannot be estimated. Improvement in the efficiency of energy conversion systems is highly restricted because of t... 详细信息
来源: 评论
Generating Highly Structured Inputs: A Survey  6
Generating Highly Structured Inputs: A Survey
收藏 引用
6th IEEE International Conference on Data science in Cyberspace, DSC 2021
作者: Li, Yabin Qin, Yinfan Tian, Jianwen Gu, Taotao Nie, Yuanping Kuang, Xiaohui School Of Computer Science Beijing University Of Posts And Telecommunications Beijing China Institute Of System Engineering Academy Of Military Sciences Beijing China National Key Laboratory Of Science And Technology On Information System Security Beijing China
Fuzzing is currently one of the most popular vulnerability mining technology. The test case generation technique plays a key role in fuzzing, and the quality of the generated test cases directly affects the effect of ... 详细信息
来源: 评论
DapperFL: domain adaptive federated learning with model fusion pruning for edge devices  24
DapperFL: domain adaptive federated learning with model fusi...
收藏 引用
Proceedings of the 38th International Conference on Neural information Processing systems
作者: Yongzhe Jia Xuyun Zhang Hongsheng Hu Kim-Kwang Raymond Choo Lianyong Qi Xiaolong Xu Amin Beheshti Wanchun Dou State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China School of Computing Macquarie University Australia School of Information and Physical Sciences University of Newcastle Australia Department of Information Systems and Cyber Security University of Texas at San Antonio USA College of Computer Science and Technology China University of Petroleum (East China) China School of Computer and Software Nanjing University of Information Science and Technology China
Federated learning (FL) has emerged as a prominent machine learning paradigm in edge computing environments, enabling edge devices to collaboratively optimize a global model without sharing their private data. However...
来源: 评论
Federated Online/Offline Remote Data Inspection for Distributed Edge Computing
arXiv
收藏 引用
arXiv 2023年
作者: Ali, Mohammad Liu, Ximeng The Department of Mathematics and Computer Science Amirkabir University of Technology Tehran Iran The Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou University Fuzhou350108 China
In edge computing environments, app vendors can cache their data to be shared with their users in many geographically distributed edge servers. However, the cached data is particularly vulnerable to several intentiona... 详细信息
来源: 评论
A fully decentralized auditing approach for edge computing: A Game-Theoretic Perspective
arXiv
收藏 引用
arXiv 2023年
作者: Seyedi, Zahra Rahmati, Farhad Ali, Mohammad Liu, Ximeng Department of Mathematics and Computer Science Amirkabir University of Technology Tehran Iran Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou University Fuzhou350108 China
Edge storage presents a viable data storage alternative for application vendors (AV), offering benefits such as reduced bandwidth overhead and latency compared to cloud storage. However, data cached in edge computing ... 详细信息
来源: 评论
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications
Owl: Differential-Based Side-Channel Leakage Detection for C...
收藏 引用
International Conference on Dependable systems and Networks (DSN)
作者: Yu Zhao Wenjie Xue Weijie Chen Weizhong Qiang Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Over the past decade, various methods for detecting side-channel leakage have been proposed and proven to be effective against CPU side-channel attacks. These methods are valuable in assisting developers to identify a... 详细信息
来源: 评论